{"id":90484,"date":"2021-10-13T18:09:07","date_gmt":"2021-10-13T12:39:07","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=90484"},"modified":"2023-02-15T18:50:37","modified_gmt":"2023-02-15T13:20:37","slug":"cetarat-apt-group-targeting-the-government-agencies","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/cetarat-apt-group-targeting-the-government-agencies\/","title":{"rendered":"CetaRAT APT Group \u2013 Targeting the Government Agencies"},"content":{"rendered":"<p>CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since then. We have been tracking this RAT for a long time and observed an increase in targeting the Indian government agencies.<\/p>\n<p>The CetaRAT infection chain starts with a Spear phishing mail with a malicious mail attachment. The attachment can be a zip file that downloads an HTA file from a remote, compromised URL. Once this HTA file is executed using mshta.exe, it drops and executes the CetaRAT payload that starts the CnC activity.<br \/>\n<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/chain.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-90485 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/chain-500x390.jpg\" alt=\"Attack Chain\" width=\"500\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/chain-500x390.jpg 500w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/chain-300x234.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/chain-768x599.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/chain-789x616.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/chain.jpg 952w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>After HTA file execution, we observed two different behaviours:<\/p>\n<p>In the first method, it creates &amp; executes the JavaScript file at the &#8220;C:\\\\ProgramData&#8221; location. The script code opens the decoy document, which is related to government topics and notifications. At the same time, CetaRAT executable payload is dropped at the Startup location and, the script operation can sleep for some duration and restart the machine.<\/p>\n<figure id=\"attachment_90487\" aria-describedby=\"caption-attachment-90487\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90487 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/1-650x222.png\" alt=\"Fig 1. JavaScript code.\" width=\"650\" height=\"222\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/1-650x222.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/1-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/1-768x262.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/1-789x269.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/1.png 1321w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-90487\" class=\"wp-caption-text\">Fig 1. JavaScript code.<\/figcaption><\/figure>\n<p>The second method observed, creating and running batch files at random name folder on C drive on the victim&#8217;s machine, which contains the instructions to add registry entry at &#8220;HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run&#8221; with the path of CetaRAT executable payload. In this variant, the executable is dropped at %AppData\/Roaming% location.<\/p>\n<figure id=\"attachment_90488\" aria-describedby=\"caption-attachment-90488\" style=\"width: 498px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90488 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/2-498x390.png\" alt=\"Fig 2. Decoy document.\" width=\"498\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/2-498x390.png 498w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/2-300x235.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/2.png 701w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><\/a><figcaption id=\"caption-attachment-90488\" class=\"wp-caption-text\">Fig 2. Decoy document.<\/figcaption><\/figure>\n<figure id=\"attachment_90489\" aria-describedby=\"caption-attachment-90489\" style=\"width: 482px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90489 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/3-482x390.png\" alt=\"Fig 3. Decoy document\" width=\"482\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/3-482x390.png 482w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/3-300x243.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/3.png 683w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a><figcaption id=\"caption-attachment-90489\" class=\"wp-caption-text\">Fig 3. Decoy document<\/figcaption><\/figure>\n<p>The CetaRAT is C#-based RAT family which exfiltrates the data from the user and sends it to the CnC server. Once it is executed, first, it will check the running AV product details from the machine with function Getans() and send details to the CnC server.<\/p>\n<figure id=\"attachment_90490\" aria-describedby=\"caption-attachment-90490\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90490 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/4-650x150.png\" alt=\"Fig 4. GetAV details from Machine.\" width=\"650\" height=\"150\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/4-650x150.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/4-300x69.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/4-768x177.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/4-789x182.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/4.png 946w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-90490\" class=\"wp-caption-text\">Fig 4. Get AV details from Machine.<\/figcaption><\/figure>\n<p>Function Start() uses the get details from machines like computer name, OS details, IP address, memory details, running processor, etc., and uploads it to CnC Server. This data is encrypted before uploading it to CnC.<\/p>\n<figure id=\"attachment_90491\" aria-describedby=\"caption-attachment-90491\" style=\"width: 294px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90491 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/5-294x390.png\" alt=\"Fig 5. Get all details from Machine.\" width=\"294\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/5-294x390.png 294w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/5-226x300.png 226w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/5.png 721w\" sizes=\"(max-width: 294px) 100vw, 294px\" \/><\/a><figcaption id=\"caption-attachment-90491\" class=\"wp-caption-text\">Fig 5. Get all details from Machine.<\/figcaption><\/figure>\n<p>The GetIP() function is used in this RAT activity to get the running machine&#8217;s IP information. Here domain &#8220;checkip.dydnd.org&#8221; is used for this purpose. This function returns the machine&#8217;s IP address.<\/p>\n<figure id=\"attachment_90492\" aria-describedby=\"caption-attachment-90492\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90492 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/6-650x218.png\" alt=\"Fig 6. Get IP details.\" width=\"650\" height=\"218\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/6-650x218.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/6-300x100.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/6-768x257.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/6.png 774w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-90492\" class=\"wp-caption-text\">Fig 6. Get IP details.<\/figcaption><\/figure>\n<p>In the next activity, the RAT uses commands to exfiltrate the data and for file operations, below are commands details-<\/p>\n<ul>\n<li>Download- use download data<\/li>\n<li>Upload- Upload the data to the CnC server.<\/li>\n<li>Download .exe- it is used for download and then executing the file.<\/li>\n<li>Created- for creating the directory on the system.<\/li>\n<li>Rename- use for rename file<\/li>\n<li>Delete- use for delete file or data.<\/li>\n<li>Screen- take a screenshot of the system<\/li>\n<li>Run- used for running the code.<\/li>\n<li>Shellexe- used for executing the payload<\/li>\n<li>Process- information of techniques.<\/li>\n<li>Pkill- To kill the running process.<\/li>\n<li>List- list of processes.<\/li>\n<\/ul>\n<figure id=\"attachment_90493\" aria-describedby=\"caption-attachment-90493\" style=\"width: 272px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90493 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/7-272x390.png\" alt=\"Fig 7. Commands used to exfiltrate data.\" width=\"272\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/7-272x390.png 272w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/7-209x300.png 209w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/7.png 671w\" sizes=\"(max-width: 272px) 100vw, 272px\" \/><\/a><figcaption id=\"caption-attachment-90493\" class=\"wp-caption-text\">Fig 7. Commands are used to exfiltrate data.<\/figcaption><\/figure>\n<p>After gathering information from the user&#8217;s machine, CetaRAT uses the RC4 algorithm to encrypt data before uploading it to the CnC server.<\/p>\n<figure id=\"attachment_90494\" aria-describedby=\"caption-attachment-90494\" style=\"width: 429px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90494 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/8-429x390.png\" alt=\"Fig 8. Use RC4 encryption\" width=\"429\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/8-429x390.png 429w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/8-300x273.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/8.png 578w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/><\/a><figcaption id=\"caption-attachment-90494\" class=\"wp-caption-text\">Fig 8. Use RC4 encryption<\/figcaption><\/figure>\n<p>Once the data is encrypted, it will exfiltrate to the CnC server using the POST HTTP method. \u00a0We can see three CnC server IPs mentioned in the code below, with the keyword &#8220;ceta&#8221;.<\/p>\n<figure id=\"attachment_90495\" aria-describedby=\"caption-attachment-90495\" style=\"width: 549px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90495 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/9-549x390.png\" alt=\"Fig 9. CnC servers.\" width=\"549\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/9-549x390.png 549w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/9-300x213.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/9.png 603w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/a><figcaption id=\"caption-attachment-90495\" class=\"wp-caption-text\">Fig 9. CnC servers.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_90496\" aria-describedby=\"caption-attachment-90496\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90496 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/10\/10-650x128.png\" alt=\"Fig 10. Wireshark capture traffic.\" width=\"650\" height=\"128\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/10-650x128.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/10-300x59.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/10-768x151.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/10-789x155.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/10\/10.png 906w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption id=\"caption-attachment-90496\" class=\"wp-caption-text\">Fig 10. Wireshark capture traffic.<\/figcaption><\/figure>\n<p><strong>IOCs-&gt; (MD5)<\/strong><\/p>\n<p><strong>HTA File-<\/strong><\/p>\n<ul>\n<li>9DEF22BE73D2713600B689F3074F3841<\/li>\n<li>849CA729063AAAD53BC743A7D476C63E<\/li>\n<li>0BA023D0CD30E77001A78B4CBA017ADE<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>CetaRAT Payload-<\/strong><\/p>\n<ul>\n<li>532ACBADB8151944650AAECC0A397965<\/li>\n<li>0058B40AEA4B981E0FC619250FC64EA3<\/li>\n<li>04213947D30FC4205A0C4D0674A27151<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>JS\/Batch Payload-<\/strong><\/p>\n<ul>\n<li>4B85ADE5E9790BDC63B80AD8EF853D40<\/li>\n<li>6F0672BBD0700AC61D1EDF201C4CABFF<\/li>\n<li>6DC67068A93E05A35E90CF066F33B79E<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Decoy documents-<\/strong><\/p>\n<ul>\n<li>5AA26DCD3CA84DB8963688BE491E8ABE<\/li>\n<li>F509CF7605566EE74DE5AABF7FEF3C61<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>IPs-<\/strong><\/p>\n<ul>\n<li>207.180.230.63<\/li>\n<li>164.68.104.126<\/li>\n<li>164.68.108.22<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>CetaRAT is Exfiltrating data that simply deliver mechanisms and aggressively infect the victim. It might leak sensitive data from a government organization, which impacts harmful activities in the countries. We recommend our customers not to access suspicious emails\/attachments and keep their <a href=\"https:\/\/www.quickheal.co.in\/\">AV software<\/a> up-to-date to protect their systems from such complex malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since then. We have been tracking this RAT for a long time and observed an increase in targeting the Indian government agencies. The CetaRAT infection chain starts with a Spear phishing mail with a malicious mail [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":90498,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24,1],"tags":[1875,1874,1873,901,49],"class_list":["post-90484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","category-uncategorized","tag-cetarat","tag-government","tag-sidecopy","tag-cyberattack","tag-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90484"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=90484"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90484\/revisions"}],"predecessor-version":[{"id":91425,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/90484\/revisions\/91425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/90498"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=90484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=90484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=90484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}